January 27, 2020

3377 words 16 mins read

Paper Group ANR 1175

Paper Group ANR 1175

HyperKG: Hyperbolic Knowledge Graph Embeddings for Knowledge Base Completion. A Cryptanalysis of Two Cancelable Biometric Schemes based on Index-of-Max Hashing. Clustering and Classification Networks. Known-plaintext attack and ciphertext-only attack for encrypted single-pixel imaging. Saliency-Guided Attention Network for Image-Sentence Matching. …

HyperKG: Hyperbolic Knowledge Graph Embeddings for Knowledge Base Completion

Title HyperKG: Hyperbolic Knowledge Graph Embeddings for Knowledge Base Completion
Authors Prodromos Kolyvakis, Alexandros Kalousis, Dimitris Kiritsis
Abstract Learning embeddings of entities and relations existing in knowledge bases allows the discovery of hidden patterns in data. In this work, we examine the geometrical space’s contribution to the task of knowledge base completion. We focus on the family of translational models, whose performance has been lagging, and propose a model, dubbed HyperKG, which exploits the hyperbolic space in order to better reflect the topological properties of knowledge bases. We investigate the type of regularities that our model can capture and we show that it is a prominent candidate for effectively representing a subset of Datalog rules. We empirically show, using a variety of link prediction datasets, that hyperbolic space allows to narrow down significantly the performance gap between translational and bilinear models.
Tasks Knowledge Base Completion, Knowledge Graph Embeddings, Link Prediction
Published 2019-08-14
URL https://arxiv.org/abs/1908.04895v2
PDF https://arxiv.org/pdf/1908.04895v2.pdf
PWC https://paperswithcode.com/paper/hyperkg-hyperbolic-knowledge-graph-embeddings
Repo
Framework

A Cryptanalysis of Two Cancelable Biometric Schemes based on Index-of-Max Hashing

Title A Cryptanalysis of Two Cancelable Biometric Schemes based on Index-of-Max Hashing
Authors Kevin Atighehchi, Loubna Ghammam, Koray Karabina, Patrick Lacharme
Abstract Cancelable biometric schemes generate secure biometric templates by combining user specific tokens and biometric data. The main objective is to create irreversible, unlinkable, and revocable templates, with high accuracy in matching. In this paper, we cryptanalyze two recent cancelable biometric schemes based on a particular locality sensitive hashing function, index-of-max (IoM): Gaussian Random Projection-IoM (GRP-IoM) and Uniformly Random Permutation-IoM (URP-IoM). As originally proposed, these schemes were claimed to be resistant against reversibility, authentication, and linkability attacks under the stolen token scenario. We propose several attacks against GRP-IoM and URP-IoM, and argue that both schemes are severely vulnerable against authentication and linkability attacks. We also propose better, but not yet practical, reversibility attacks against GRP-IoM. The correctness and practical impact of our attacks are verified over the same dataset provided by the authors of these two schemes.
Tasks Cryptanalysis
Published 2019-10-03
URL https://arxiv.org/abs/1910.01389v3
PDF https://arxiv.org/pdf/1910.01389v3.pdf
PWC https://paperswithcode.com/paper/a-cryptanalysis-of-two-cancelable-biometric
Repo
Framework

Clustering and Classification Networks

Title Clustering and Classification Networks
Authors Jin-mo Choi
Abstract In this paper, we will describe a network architecture that demonstrates high performance on various sizes of datasets. To do this, we will perform an architecture search by dividing the fully connected layer into three levels in the existing network architecture. The first step is to learn existing CNN layer and existing fully connected layer for 1 epoch. The second step is clustering similar classes by applying L1 distance to the result of Softmax. The third step is to reclassify using clustering class masks. We accomplished the result of state-of-the-art by performing the above three steps sequentially or recursively. The technology recorded an error of 11.56% on Cifar-100.
Tasks Neural Architecture Search
Published 2019-06-20
URL https://arxiv.org/abs/1906.08714v1
PDF https://arxiv.org/pdf/1906.08714v1.pdf
PWC https://paperswithcode.com/paper/clustering-and-classification-networks
Repo
Framework

Known-plaintext attack and ciphertext-only attack for encrypted single-pixel imaging

Title Known-plaintext attack and ciphertext-only attack for encrypted single-pixel imaging
Authors Shuming Jiao, Yang Gao, Ting Lei, Zhenwei Xie, Xiaocong Yuan
Abstract In many previous works, a single-pixel imaging (SPI) system is constructed as an optical image encryption system. Unauthorized users are not able to reconstruct the plaintext image from the ciphertext intensity sequence without knowing the illumination pattern key. However, little cryptanalysis about encrypted SPI has been investigated in the past. In this work, we propose a known-plaintext attack scheme and a ciphertext-only attack scheme to an encrypted SPI system for the first time. The known-plaintext attack is implemented by interchanging the roles of illumination patterns and object images in the SPI model. The ciphertext-only attack is implemented based on the statistical features of single-pixel intensity values. The two schemes can crack encrypted SPI systems and successfully recover the key containing correct illumination patterns.
Tasks Cryptanalysis
Published 2019-05-31
URL https://arxiv.org/abs/1905.13594v1
PDF https://arxiv.org/pdf/1905.13594v1.pdf
PWC https://paperswithcode.com/paper/known-plaintext-attack-and-ciphertext-only
Repo
Framework

Saliency-Guided Attention Network for Image-Sentence Matching

Title Saliency-Guided Attention Network for Image-Sentence Matching
Authors Zhong Ji, Haoran Wang, Jungong Han, Yanwei Pang
Abstract This paper studies the task of matching image and sentence, where learning appropriate representations across the multi-modal data appears to be the main challenge. Unlike previous approaches that predominantly deploy symmetrical architecture to represent both modalities, we propose Saliency-guided Attention Network (SAN) that asymmetrically employs visual and textual attention modules to learn the fine-grained correlation intertwined between vision and language. The proposed SAN mainly includes three components: saliency detector, Saliency-weighted Visual Attention (SVA) module, and Saliency-guided Textual Attention (STA) module. Concretely, the saliency detector provides the visual saliency information as the guidance for the two attention modules. SVA is designed to leverage the advantage of the saliency information to improve discrimination of visual representations. By fusing the visual information from SVA and textual information as a multi-modal guidance, STA learns discriminative textual representations that are highly sensitive to visual clues. Extensive experiments demonstrate SAN can substantially improve the state-of-the-art results on the benchmark Flickr30K and MSCOCO datasets by a large margin.
Tasks
Published 2019-04-20
URL https://arxiv.org/abs/1904.09471v3
PDF https://arxiv.org/pdf/1904.09471v3.pdf
PWC https://paperswithcode.com/paper/saliency-guided-attention-network-for-image
Repo
Framework

Hard Choices in Artificial Intelligence: Addressing Normative Uncertainty through Sociotechnical Commitments

Title Hard Choices in Artificial Intelligence: Addressing Normative Uncertainty through Sociotechnical Commitments
Authors Roel Dobbe, Thomas Krendl Gilbert, Yonatan Mintz
Abstract As AI systems become prevalent in high stakes domains such as surveillance and healthcare, researchers now examine how to design and implement them in a safe manner. However, the potential harms caused by systems to stakeholders in complex social contexts and how to address these remains unclear. In this paper, we explain the inherent normative uncertainty in debates about the safety of AI systems. We then address this as a problem of vagueness by examining its place in the design, training, and deployment stages of AI system development. We adopt Ruth Chang’s theory of intuitive comparability to illustrate the dilemmas that manifest at each stage. We then discuss how stakeholders can navigate these dilemmas by incorporating distinct forms of dissent into the development pipeline, drawing on Elizabeth Anderson’s work on the epistemic powers of democratic institutions. We outline a framework of sociotechnical commitments to formal, substantive and discursive challenges that address normative uncertainty across stakeholders, and propose the cultivation of related virtues by those responsible for development.
Tasks
Published 2019-11-20
URL https://arxiv.org/abs/1911.09005v1
PDF https://arxiv.org/pdf/1911.09005v1.pdf
PWC https://paperswithcode.com/paper/hard-choices-in-artificial-intelligence
Repo
Framework

On Leveraging the Visual Modality for Neural Machine Translation

Title On Leveraging the Visual Modality for Neural Machine Translation
Authors Vikas Raunak, Sang Keun Choe, Quanyang Lu, Yi Xu, Florian Metze
Abstract Leveraging the visual modality effectively for Neural Machine Translation (NMT) remains an open problem in computational linguistics. Recently, Caglayan et al. posit that the observed gains are limited mainly due to the very simple, short, repetitive sentences of the Multi30k dataset (the only multimodal MT dataset available at the time), which renders the source text sufficient for context. In this work, we further investigate this hypothesis on a new large scale multimodal Machine Translation (MMT) dataset, How2, which has 1.57 times longer mean sentence length than Multi30k and no repetition. We propose and evaluate three novel fusion techniques, each of which is designed to ensure the utilization of visual context at different stages of the Sequence-to-Sequence transduction pipeline, even under full linguistic context. However, we still obtain only marginal gains under full linguistic context and posit that visual embeddings extracted from deep vision models (ResNet for Multi30k, ResNext for How2) do not lend themselves to increasing the discriminativeness between the vocabulary elements at token level prediction in NMT. We demonstrate this qualitatively by analyzing attention distribution and quantitatively through Principal Component Analysis, arriving at the conclusion that it is the quality of the visual embeddings rather than the length of sentences, which need to be improved in existing MMT datasets.
Tasks Machine Translation, Multimodal Machine Translation
Published 2019-10-07
URL https://arxiv.org/abs/1910.02754v1
PDF https://arxiv.org/pdf/1910.02754v1.pdf
PWC https://paperswithcode.com/paper/on-leveraging-the-visual-modality-for-neural
Repo
Framework

Deep Discriminative Representation Learning with Attention Map for Scene Classification

Title Deep Discriminative Representation Learning with Attention Map for Scene Classification
Authors Jun Li, Daoyu Lin, Yang Wang, Guangluan Xu, Chibiao Ding
Abstract Learning powerful discriminative features for remote sensing image scene classification is a challenging computer vision problem. In the past, most classification approaches were based on handcrafted features. However, most recent approaches to remote sensing scene classification are based on Convolutional Neural Networks (CNNs). The de facto practice when learning these CNN models is only to use original RGB patches as input with training performed on large amounts of labeled data (ImageNet). In this paper, we show class activation map (CAM) encoded CNN models, codenamed DDRL-AM, trained using original RGB patches and attention map based class information provide complementary information to the standard RGB deep models. To the best of our knowledge, we are the first to investigate attention information encoded CNNs. Additionally, to enhance the discriminability, we further employ a recently developed object function called “center loss,” which has proved to be very useful in face recognition. Finally, our framework provides attention guidance to the model in an end-to-end fashion. Extensive experiments on two benchmark datasets show that our approach matches or exceeds the performance of other methods.
Tasks Face Recognition, Representation Learning, Scene Classification
Published 2019-02-21
URL http://arxiv.org/abs/1902.07967v1
PDF http://arxiv.org/pdf/1902.07967v1.pdf
PWC https://paperswithcode.com/paper/deep-discriminative-representation-learning
Repo
Framework

3D Object Instance Recognition and Pose Estimation Using Triplet Loss with Dynamic Margin

Title 3D Object Instance Recognition and Pose Estimation Using Triplet Loss with Dynamic Margin
Authors Sergey Zakharov, Wadim Kehl, Benjamin Planche, Andreas Hutter, Slobodan Ilic
Abstract In this paper, we address the problem of 3D object instance recognition and pose estimation of localized objects in cluttered environments using convolutional neural networks. Inspired by the descriptor learning approach of Wohlhart et al., we propose a method that introduces the dynamic margin in the manifold learning triplet loss function. Such a loss function is designed to map images of different objects under different poses to a lower-dimensional, similarity-preserving descriptor space on which efficient nearest neighbor search algorithms can be applied. Introducing the dynamic margin allows for faster training times and better accuracy of the resulting low-dimensional manifolds. Furthermore, we contribute the following: adding in-plane rotations (ignored by the baseline method) to the training, proposing new background noise types that help to better mimic realistic scenarios and improve accuracy with respect to clutter, adding surface normals as another powerful image modality representing an object surface leading to better performance than merely depth, and finally implementing an efficient online batch generation that allows for better variability during the training phase. We perform an exhaustive evaluation to demonstrate the effects of our contributions. Additionally, we assess the performance of the algorithm on the large BigBIRD dataset to demonstrate good scalability properties of the pipeline with respect to the number of models.
Tasks Pose Estimation
Published 2019-04-09
URL http://arxiv.org/abs/1904.04854v1
PDF http://arxiv.org/pdf/1904.04854v1.pdf
PWC https://paperswithcode.com/paper/3d-object-instance-recognition-and-pose
Repo
Framework

Ranking Online Consumer Reviews

Title Ranking Online Consumer Reviews
Authors Sunil Saumya, Jyoti Prakash Singh, Abdullah Mohammed Baabdullah, Nripendra P. Rana, Yogesh k. Dwivedi
Abstract The product reviews are posted online in the hundreds and even in the thousands for some popular products. Handling such a large volume of continuously generated online content is a challenging task for buyers, sellers, and even researchers. The purpose of this study is to rank the overwhelming number of reviews using their predicted helpfulness score. The helpfulness score is predicted using features extracted from review text data, product description data and customer question-answer data of a product using random-forest classifier and gradient boosting regressor. The system is made to classify the reviews into low or high quality by random-forest classifier. The helpfulness score of the high-quality reviews is only predicted using gradient boosting regressor. The helpfulness score of the low-quality reviews is not calculated because they are never going to be in the top k reviews. They are just added at the end of the review list to the review-listing website. The proposed system provides fair review placement on review listing pages and making all high-quality reviews visible to customers on the top. The experimental results on data from two popular Indian e-commerce websites validate our claim, as 3-4 new high-quality reviews are placed in the top ten reviews along with 5-6 old reviews based on review helpfulness. Our findings indicate that inclusion of features from product description data and customer question-answer data improves the prediction accuracy of the helpfulness score.
Tasks
Published 2019-01-17
URL http://arxiv.org/abs/1901.06274v1
PDF http://arxiv.org/pdf/1901.06274v1.pdf
PWC https://paperswithcode.com/paper/ranking-online-consumer-reviews
Repo
Framework

Highly Scalable and Flexible Model for Effective Aggregation of Context-based Data in Generic IIoT Scenarios

Title Highly Scalable and Flexible Model for Effective Aggregation of Context-based Data in Generic IIoT Scenarios
Authors Simon Duque Anton, Daniel Fraunholz, Janis Zemitis, Frederic Pohl, Hans Dieter Schotten
Abstract Interconnectivity of production machines is a key feature of the Industrial Internet of Things (IIoT). This feature allows for many advantages in producing. Configuration and maintenance gets easier, as access to the given production unit is not necessarily coupled to physical presence. Customized production of goods is easily possible, reducing production times and increasing throughput. There are, however, also dangers to the increasing talkativeness of industrial production machines. The more open a system is, the more points of entry for an attacker exist. Furthermore, the amount of data a production site also increases rapidly due to the integrated intelligence and interconnectivity. To keep track of this data in order to detect attacks and errors in the production site, it is necessary to smartly aggregate and evaluate the data. In this paper, we present a new approach for collecting, aggregating and analysing data from different sources and on three different levels of abstraction. Our model is event-centric, considering every occurrence of information inside the system as an event. In the lowest level of abstraction, singular packets are collected, correlated with log-entries and analysed. On the highest level of abstraction, networks are pictured as a connectivity graph, enriched with information about host-based activities. Furthermore, we describe our work in progress of evaluating our aggregation model on two different system settings. In the first scenario, we verify the usability of our model in a remote maintenance application. In the second scenario, we evaluate our model in the context of network sniffing and correlation with log-files. First results show that our model is a promising solution to cope with increasing amounts of data and to correlate information from different types of sources.
Tasks
Published 2019-05-28
URL https://arxiv.org/abs/1906.03064v1
PDF https://arxiv.org/pdf/1906.03064v1.pdf
PWC https://paperswithcode.com/paper/highly-scalable-and-flexible-model-for
Repo
Framework

Fair Classification and Social Welfare

Title Fair Classification and Social Welfare
Authors Lily Hu, Yiling Chen
Abstract Now that machine learning algorithms lie at the center of many resource allocation pipelines, computer scientists have been unwittingly cast as partial social planners. Given this state of affairs, important questions follow. What is the relationship between fairness as defined by computer scientists and notions of social welfare? In this paper, we present a welfare-based analysis of classification and fairness regimes. We translate a loss minimization program into a social welfare maximization problem with a set of implied welfare weights on individuals and groups–weights that can be analyzed from a distribution justice lens. In the converse direction, we ask what the space of possible labelings is for a given dataset and hypothesis class. We provide an algorithm that answers this question with respect to linear hyperplanes in $\mathbb{R}^d$ that runs in $O(n^dd)$. Our main findings on the relationship between fairness criteria and welfare center on sensitivity analyses of fairness-constrained empirical risk minimization programs. We characterize the ranges of $\Delta \epsilon$ perturbations to a fairness parameter $\epsilon$ that yield better, worse, and neutral outcomes in utility for individuals and by extension, groups. We show that applying more strict fairness criteria that are codified as parity constraints, can worsen welfare outcomes for both groups. More generally, always preferring “more fair” classifiers does not abide by the Pareto Principle—a fundamental axiom of social choice theory and welfare economics. Recent work in machine learning has rallied around these notions of fairness as critical to ensuring that algorithmic systems do not have disparate negative impact on disadvantaged social groups. By showing that these constraints often fail to translate into improved outcomes for these groups, we cast doubt on their effectiveness as a means to ensure justice.
Tasks
Published 2019-05-01
URL http://arxiv.org/abs/1905.00147v1
PDF http://arxiv.org/pdf/1905.00147v1.pdf
PWC https://paperswithcode.com/paper/fair-classification-and-social-welfare
Repo
Framework

A BLSTM Network for Printed Bengali OCR System with High Accuracy

Title A BLSTM Network for Printed Bengali OCR System with High Accuracy
Authors Debabrata Paul, Bidyut Baran Chaudhuri
Abstract This paper presents a printed Bengali and English text OCR system developed by us using a single hidden BLSTM-CTC architecture having 128 units. Here, we did not use any peephole connection and dropout in the BLSTM, which helped us in getting better accuracy. This architecture was trained by 47,720 text lines that include English words also. When tested over 20 different Bengali fonts, it has produced character level accuracy of 99.32% and word level accuracy of 96.65%. A good Indic multi script OCR system is also developed by Google. It sometimes recognizes a character of Bengali into the same character of a non-Bengali script, especially Assamese, which has no distinction from Bengali, except for a few characters. For example, Bengali character for ‘RA’ is sometimes recognized as that of Assamese, mainly in conjunct consonant forms. Our OCR is free from such errors. This OCR system is available online at https://banglaocr.nltr.org
Tasks Optical Character Recognition
Published 2019-08-23
URL https://arxiv.org/abs/1908.08674v1
PDF https://arxiv.org/pdf/1908.08674v1.pdf
PWC https://paperswithcode.com/paper/a-blstm-network-for-printed-bengali-ocr
Repo
Framework

When Specialization Helps: Using Pooled Contextualized Embeddings to Detect Chemical and Biomedical Entities in Spanish

Title When Specialization Helps: Using Pooled Contextualized Embeddings to Detect Chemical and Biomedical Entities in Spanish
Authors Manuel Stoeckel, Wahed Hemati, Alexander Mehler
Abstract The recognition of pharmacological substances, compounds and proteins is an essential preliminary work for the recognition of relations between chemicals and other biomedically relevant units. In this paper, we describe an approach to Task 1 of the PharmaCoNER Challenge, which involves the recognition of mentions of chemicals and drugs in Spanish medical texts. We train a state-of-the-art BiLSTM-CRF sequence tagger with stacked Pooled Contextualized Embeddings, word and sub-word embeddings using the open-source framework FLAIR. We present a new corpus composed of articles and papers from Spanish health science journals, termed the Spanish Health Corpus, and use it to train domain-specific embeddings which we incorporate in our model training. We achieve a result of 89.76% F1-score using pre-trained embeddings and are able to improve these results to 90.52% F1-score using specialized embeddings.
Tasks Word Embeddings
Published 2019-10-08
URL https://arxiv.org/abs/1910.03387v1
PDF https://arxiv.org/pdf/1910.03387v1.pdf
PWC https://paperswithcode.com/paper/when-specialization-helps-using-pooled
Repo
Framework

Escaping the State of Nature: A Hobbesian Approach to Cooperation in Multi-agent Reinforcement Learning

Title Escaping the State of Nature: A Hobbesian Approach to Cooperation in Multi-agent Reinforcement Learning
Authors William Long
Abstract Cooperation is a phenomenon that has been widely studied across many different disciplines. In the field of computer science, the modularity and robustness of multi-agent systems offer significant practical advantages over individual machines. At the same time, agents using standard reinforcement learning algorithms often fail to achieve long-term, cooperative strategies in unstable environments when there are short-term incentives to defect. Political philosophy, on the other hand, studies the evolution of cooperation in humans who face similar incentives to act individualistically, but nevertheless succeed in forming societies. Thomas Hobbes in Leviathan provides the classic analysis of the transition from a pre-social State of Nature, where consistent defection results in a constant state of war, to stable political community through the institution of an absolute Sovereign. This thesis argues that Hobbes’s natural and moral philosophy are strikingly applicable to artificially intelligent agents and aims to show that his political solutions are experimentally successful in producing cooperation among modified Q-Learning agents. Cooperative play is achieved in a novel Sequential Social Dilemma called the Civilization Game, which models the State of Nature by introducing the Hobbesian mechanisms of opponent learning awareness and majoritarian voting, leading to the establishment of a Sovereign.
Tasks Multi-agent Reinforcement Learning, Q-Learning
Published 2019-06-05
URL https://arxiv.org/abs/1906.09874v1
PDF https://arxiv.org/pdf/1906.09874v1.pdf
PWC https://paperswithcode.com/paper/escaping-the-state-of-nature-a-hobbesian
Repo
Framework
comments powered by Disqus